Publications

     Press releases and other Documents

 

Scientific Publications

2018
2017
2016
2015
  • Kaufhold, M., Reuter, C.: Konzept und Evaluation einer Facebook-Applikation zur crossmedialen Selbstorganisation freiwilliger Helfer. In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), Osnabrück, Germany, 2015, pp. 1844-1858. (17th May 2015)
  • Ludwig, T., Reuter, C., Heukäufer R., Pipek, V.: CoTable: Collaborative Social Media Analysis with Multi-Touch Tables. In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Kristiansand, Norway, 2015. (24th May 2015)
  • Ludwig, T., Reuter, C., Pipek, V.: Social Haystack: Dynamic Quality Assessment of Citizen-Generated Content in Social Media during Emergencies. In: Transactions on Human Computer Interaction (ToCHI), vol. 21, iss. accepted, 2015. (4th July 2015)
  • Ludwig, T., Reuter, C., Siebigteroth, T., Pipek, V.: CrowdMonitor: Mobile Crowd Sensing for Assessing Physical and Digital Activities of Citizens during Emergencies. In: Proceedings of the Conference on Human Factors in Computing Systems (CHI), Seoul, Korea, 2015. (1st May 2015)
  • Moi, M., Friberg, T., Marterer, R., Reuter, C., Ludwig, T., Markham, D., Hewlett, M., Muddiman, A. Strategy for Processing and Analyzing Social Media Data Streams in Emergencies. In: Proceedings of the International Conference on Information and Communication Technologies for Disaster Management (ICT-DM). Brest, France (30th November 2015 – 2nd December 2015)
  • Reuter, C., Ludwig, T., Friberg, T., Pratzler-Wanczura, S., Gizikis, A. (2015) Social Media and Emergency Services? Interview Study on Current and Potential Use in 7 European Countries, International Journal of Information Systems for Crisis Response and Management (IJISCRAM) 7(2), p. 36-58 (1st December 2015)
  • Reuter, C., Ludwig, T., Funke, T., Pipek, V.: SOMAP: Network Independent Social-Offline-Map-Mashup. In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Kristiansand, Norway, 2015. (24th May 2015)
  • Reuter, C., Mentler, T., Geisler, S., Herczeg, M., Ludwig, T., Pipek, V., Nestler, S., Sautter, J. (Eds.): Proceedings des Workshops “Mensch-Computer-Interaktion und Social Computing in sicherheitskritischen Systemen” (KritischeMCI). In: Mensch & Computer 2015 – Workshopband, Oldenbourg-Verlag. (6th – 9th September 2015)
  • Reuter, C., Ludwig, T., Ritzkatis, M., & Pipek, V. (2015). Social-QAS: Tailorable Quality Assessment Service for Social Media Content. In Proceedings of the International Symposium on End-User Development (IS-EUD). Lecture Notes in Computer Science. (30th April 2015)
  • Reuter, C., Ludwig, T., Kaufhold, M.-A., & Pipek, V. (2015). XHELP: Design of a Cross-Platform Social-Media Application to Support Volunteer Moderators in Disasters. In CHI ’15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 4093–4102). Seoul, Korea: ACM Press. (18th April 2016)
  • Reuter, C., Schröter, J.: Microblogging during the European Floods 2013: What Twitter May Contribute in German Emergencies. In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 7(1). (13th January 2015)
2014
  • Greenlaw, R., Muddiman, A., Friberg, T., Moi, M., Cristaldi, M., Ludwig, T., Reuter, C.: The EmerGent project: Emergency Management in Social Media Generation – Dealing with Big Data from Social Media Data Stream. In: Workshop on Big Data, Intelligence Management and Analytics Workshop. 7th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), London, United Kingdom, 2014. (8th December 2014)
  • Pipek, V., Reuter, C. (Eds.): Special Issue zum Themenschwerpunkt Krisenmanagement. i-com – Zeitschrift für interaktive und kooperative Medien, Vol. 13, No.1 (ISSN: 2196-6826).
  • Reuter, C.: Emergent Collaboration Infrastructures: Technology Design for Inter-Organizational Crisis Management (Ph.D. Thesis), Siegen, Germany: Springer Gabler, 2014. (31th October 2014)
  • Reuter, C., Ludwig, T., Pipek, V., Herczeg, M., Mentler, T., Nestler, S., Sautter, J. (Eds.): Mensch-Computer-Interaktion und Social Computing in Krisensituationen. In: Mensch & Computer 2014 – Workshopband, Hrsg. Koch, M., Butz, A., Schlichter, J. München, Oldenbourg-Verlag, pp. 99-140. (ISBN: 978-3-11-034450-9)
  • Reuter, C., Ritzakis, M.: Adaptierbare Qualitätsbewertung bürgergenerierter Inhalte aus sozialen Medien. In: Mensch und Computer 2014 – Tagungsband: Interaktiv unterwegs – Freiräume gestalten, Hrsg. v. Butz,A., Koch,M., Schlichter, J., München, Oldenbourg-Verlag, pp.115-124. (ISBN: 978-3-11-034448-6) (2nd September 2016)
  • Reuter, C., Ritzkatis, M., Ludwig, T.: Entwicklung eines SOA-basierten und anpassbaren Bewertungsdienstes für Inhalte aus sozialen Medien. In Informatik – Big Data – Komplexität meistern. Stuttgart, Germany: GI-Edition-Lecture Notes in Informatics (LNI). (24th September 2014)

 

Conferences, Workshops, etc.

 

Deliverables

Note: To access a deliverable please contact us

Work Package 2: Impact of Social Media in Emergencies

D2.1 Concept for Impact Assessment 31/07/2014
D2.2 Impact of Social Media for ES and citizens 31/12/2014
D2.3 Impact of Social Media for ES and citizens using EmerGent concepts, Version 1 31/05/2016
D2.4 Impact of Social Media for ES and citizens using EmerGent concepts, Version 2 31/07/2017
D2.5 Continuous citizens and ES involvement over Social Media 31/04/2017
Confidential D2.6 Workshop I and II 30/04/2016
D2.7 Workshop III 31/03/2017

Work Package 3: Analysis of Social Media in Emergencies Today and Tomorrow

D3.1 Usage of Patterns of Social Media in Emergencies 30/06/2014
D3.2 Guidelines for Social Media Integration into existing ES Systems 31/07/2014
D3.3 Interaction Design Patterns for Using EmerGent in Social Apps 30/06/2014
Confidential D3.4 User Requirements, Version 1 31/10/2014
D3.5 User Requirements, Version 2 29/02/2016
Confidential D3.6 End-user based view on Potentials of Social Media Usage for ES and citizens’ involvement in the EMC 31/10/2014
D3.7 Potentials of Social Media Usage by ES and citizens’ involvement in the EMC enabled by EmerGent 31/05/2016

Work Package 4: Information Mining and Information Quality

 

Confidential D4.1 Semantic Data Model, Version 1 30/09/2014
Confidential D4.2 Semantic Data Model, Version 2 31/03/2016
Confidential D4.3 Specification of Mining Methods to develop, Version 1 30/09/2014
Confidential D4.4 Specification of Mining Methods to develop, Version 2 31/03/2016
Confidential D4.5 Information Quality Criteria and Indicators 31/03/2017
Confidential D4.6 Specification of Information Mining and Information Quality components 31/01/2015
Confidential D4.7 Concept for enhanced Data Visualisation & Filtering 30/04/2016
Confidential D4.8 Documentation of Information Mining and Information Quality components 31/10/2016

Work Package 5: Information Collection and Presentation

Confidential D5.1 Identification of Social Network Providers and API Design 30/09/2014
Confidential D5.2 Design of Information Routing to Emergency Services and Citizens 31/12/2014
Confidential D5.3 Design of Information Routing to Emergency Services and Citizens 31/12/2014
Confidential D5.4 Information gathering and expected Interfaces 31/07/2015
Confidential D5.5 Implementation and Verification of Information Routing and Social Apps, Version 1 30/06/2015
Confidential D5.6 Implementation and Verification of Information Routing and Social Apps, Version 2 31/10/2015

Work Package 6: Novel Emergency Management in Social Media Generation

Confidential D6.1 Specification of the Overall System Architecture 28/02/2015
Confidential D6.2 Validation of Components and the integrated System, Version 1 31/01/2016
Confidential D6.3 Validation of Components and the integrated System, Version 2 31/03/2017
Confidential D6.4 User-oriented Evaluation 31/07/2017

Work Package 7: Guidelines, Dissemination, Exploitation and Ethics

D7.1 Dissemination Activities 31/03/2017
D7.2 Dissemination Campaign 31/05/2017
D7.3 Guidelines to increase the Benefit of Social Media in Emergencies 31/05/2017
D7.4 Exploitation activities 31/07/2017
Confidential D7.5 Data Protection and Privacy 31/07/2014
Confidential D7.6 Continuous Monitoring of Legal Ethical Definitions and Compliance & Measures against improper Use of Data, Version 1 31/03/2015
Confidential D7.7 Continuous Monitoring of Legal Ethical Definitions and Compliance & Measures against improper Use of Data, Version 2 31/05/2016
D7.8 Continuous Monitoring of Legal Ethical Definitions and Compliance & Measures against improper Use of Data, Version 2 31/05/2017
Confidential D7.9 Ethical Notifications and Approvals 31/07/2014